1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lena [83]
3 years ago
8

Please explain this code line by line and how the values of each variable changes as you go down the code.

Computers and Technology
1 answer:
Scilla [17]3 years ago
6 0

Answer:

hope this helps. I am also a learner like you. Please cross check my explanation.

Explanation:

#include

#include

using namespace std;

int main()

{

int a[ ] = {0, 0, 0};  //array declared initializing a0=0, a1=0, a3=0

int* p = &a[1]; //pointer p is initialized it will be holding the address of a1 which means when p will be called it will point to whatever is present at the address a1, right now it hold 0.

int* q = &a[0];  //pointer q is initialized it will be holding the address of a0 which means when q will be called it will point to whatever is present at the address a0, right now it hold 0.

q=p; // now q is also pointing towards what p is pointing both holds the same address that is &a[1]

*q=1 ; //&a[0] gets overwritten and now pointer q has integer 1......i am not sure abut this one

p = a; //p is now holding address of complete array a

*p=1; // a gets overwritten and now pointer q has integer 1......i am not sure abut this one  

int*& r = p; //not sure

int** s = &q; s is a double pointer means it has more capacity of storage than single pointer and is now holding address of q

r = *s + 1; //not sure

s= &r; //explained above

**s = 1; //explained above

return 0;

}

You might be interested in
Mobile providers can be susceptible to poor coverage indoors as a result of: a high degree of latency. network congestion that c
Aliun [14]

Answer:

C. spectrum used by most mobile phone firms that does not travel well through solid objects.

Explanation:

Obstructions on the path of radio waves can result to poor network coverage. This is also called Phone reception or coverage black spot. Just as an obstruction on the path of light waves causes the emergence of shadows, so also an obstruction from waves coming from the cell tower. Common culprits are windows, doors, roofing materials, and walls. These solid objects cause an interruption of network for network providers inside a building.

The use of antennas connected from outside the building to inside can be helpful in reducing the effect of this obstruction. Problems resulting could be low signal, difficulty hearing a caller at the other end, slow internet connection, etc.

5 0
4 years ago
Hugh is giving an informative speech about U.S. Senate election campaigns. Which thesis statement do you recommend he use?
34kurt
I recommend that he use this thesis statement :

<em>Candidates often use television advertising while campaigning for election to the senate, because television reaches millions of people and thus the ability to dramatically increase name recognition</em>
5 0
3 years ago
Write two examples of hard copy output?​
amid [387]

if you are asking for hard copy output devices, then two examples would be

printers

plotters

if you are asking for types hard copy documents then two examples would be

letter

card

7 0
3 years ago
Que es la fisiconometria?
Anni [7]

Answer:

it is a field of study concerned with the theory and technique of psychological measurement.

or

Medición de las funciones mentales en general y de las características psíquicas de los individuos en particular.

Explanation:

8 0
3 years ago
In both direct flooding attacks and _____ the use of spoofed source addresses results in response packets being scattered across
Natali5045456 [20]

Answer:

SYN spoofing attacks.    

Explanation:

The Spoofing attack is used to access the personal information it is distributed the  viruses through infected links or file .The spoofing attacks has redistributed the traffic and the flow control in the denial-of-service attacks.

The SYN spoofing attacks is used the spoofed source in the result of giving response to packet The Spoofing attack  is distributed  across the Internet also it is detectable

6 0
3 years ago
Other questions:
  • What statement best describes what a circle graph shows
    13·1 answer
  • How to find something in the cloud?
    8·1 answer
  • The ____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requir
    8·1 answer
  • There are only three active stations in a slotted aloha network: a, b, andc. each station generates a frame in a time slot with
    15·1 answer
  • If after a run of arc consistency during the backtracking search we end up with the filtered domains of *all* of the not yet ass
    12·1 answer
  • Sadie helman runs a web site for amateur snowboarders. she likes to post videos and music related to snowboarding on her site as
    12·1 answer
  • A computer is performing a binary search on the sorted list of 7 numbers below.
    10·2 answers
  • How do I make someone "Brainiest". <br> First person to reply will get "Brainiest"
    8·2 answers
  • Write a for loop to print all the even numbers from 200 to 300.
    14·1 answer
  • What is a list of things we use programming for??? longest gets brainly
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!